Free Essay

Execl

In: Business and Management

Submitted By gsnuf
Words 1601
Pages 7
LBS 3001: Introduction to Labor Studies
(Section RXLA-55242)
Summer A 2013

Instructor: Professor Alí R. Bustamante Schedule: Mondays and Wednesdays / 11:00am – 1:40pm
Credits: 3 Location: PC 439

Office Hours: LC 315, one hour before class or by appointment.
E-mail: albustam@fiu.edu
Department Phone: (305) 348-1519

Course Description:
This course will introduce you to the challenges and struggles of working people in the United States. In our readings and classroom discussions, we will pay close attention to the conditions faced by low-wage workers in industrial, agricultural, and service jobs, as well as the impact of globalization on labor markets in the U.S. and abroad. We will also look at some of the hidden dimensions of working-class life through the lens of slavery, immigration, and global economic competition.

By the end of the course, you will understand and be able to analyze:
1. What class is and how it operates in American society;
2. What it is like to work at a various low-wage jobs while trying to sustain yourself;
3. The impact of race, ethnicity, and gender on conditions in the American workplace;
4. How management exerts control over industrial, agricultural, and service workers;
5. The impact of large retailers and other consumer-oriented industries in determining conditions in the modern American workplace;
6. The role of immigration and the immigrant experience in the American workplace;
7. The evolution of and relationship between small, privately held businesses and large multinational corporations;
8. The impact of Wall Street and corporate finance on the U.S. economy (especially industrial jobs);
9. Why income disparities exist between different regions in the U.S. and how government subsidies perpetuate this inequality;
10. What modern slavery looks like in the U.S. and how it is related to globalization, immigration, and other factors;
11. The role of unions and other worker-controlled organizations in the struggle for workplace justice.

Required Texts:
• Bowe, John. 2008. Nobodies: Modern American Slave Labor and the Dark Side of the New Global Economy. New York, NY: Random House.
• Ehrenreich, Barbara. 2011. Nickel and Dimed: On (Not) Getting By in America. New York, NY: Picador.

All additional reading materials will be available either at the course reserve desk in the library or on the LBS 3001 Blackboard Learning website. To access this site:
1. Go to http://online.fiu.edu/
2. Click on “Course Login”
3. Click on “Blackboard Learn Login”
4. Enter your Panther Soft username and password
5. Click on the link to LBS 3001 under “My Courses” and then click on “Assigned Readings” in the left-hand toolbar

Note: Bring all scheduled readings to class.
Grading Scale: 10% | Attendance | 40% | Written assignments (4) | 20% | Exams (2) | 30% | Final exam |
93-100 A
90-92 A-
87-89 B+
83-86 B
80-82 B-
77-79 C+
73-76 C
70-72 C-
67-69 D+
60-66 D
0-59 F This syllabus is subject to be changed by the Professor, if necessary. There is no extra credit. No assignments will be accepted beyond their due date without prior approval.

Written Assignments:
You will be responsible for completing four short written assignments, each of which will be worth 10% of your final grade (40% total). These 2 to 3 page essays will be based on a question or set of questions that I will hand out in class at least one week before they are due. ALL PAPERS must be double-spaced, typed in 12-point, Times New Roman font with one inch margins on each side, and follow American Sociological Society (ASA) citation style.

Exams:
Exams are based on lectures and assigned readings. All exams are cumulative.

Attendance and Participation:
Everyone is expected to complete the assigned readings (60-90 pages per week) prior to class and be prepared to discuss them critically. Full participation in both classroom and group discussions is required for you to be successful in this course. Class attendance and participation will constitute 20% of your final grade. Because you cannot participate if you do not attend, you will only be allowed 2 absences (excused or unexcused) without penalty. For each additional absence beyond this, I will subtract 5 percentage points from your attendance and participation grade.

Academic Misconduct Statement:
Florida International University is a community dedicated to generating and imparting knowledge through excellent teaching and research, the rigorous and respectful exchange of ideas and community service. All students should respect the right of others to have an equitable opportunity to learn and honestly to demonstrate the quality of their learning. Therefore, all students are expected to adhere to a standard of academic conduct, which demonstrates respect for themselves, their fellow students, and the educational mission of the University. All students are deemed by the University to understand that if they are found responsible for academic misconduct, they will be subject to the Academic Misconduct procedures and sanctions, as outlined in the Student Handbook.

Misconduct includes: Cheating – The unauthorized use of books, notes, aids, electronic sources; or assistance from another person with respect to examination, course assignments, field service reports, class recitations; or the unauthorized possession of examination papers or course materials, whether originally authorized or not. Plagiarism – The use and appropriation of another’s work without any indication of the source and the representation of such work as the student’s own. Any student who fails to give credit for ideas, expressions or materials taken from another source, including internet sources, is responsible for plagiarism.
Course Outline:

Week 1
(5/13): Introduction to the Course
Syllabus
Sweet, Stephen and Peter Meiksins. 2012. Changing Contours of Work: Jobs and Opportunities in the New Economy. Thousand Oaks, CA: Sage Press. Pp. 1-22. (online)

(5/15): Exploring American Working Life: The “Old Economy” and Industrialism.
Babson, Steve. 1999. The Unfinished Struggle: Turning Points in American Labor. Lanham, MD: Rowman and Littlefield. Pp. 1-18. (online and on reserve)
Fraser, Steve. 1989. “The Labor Question.” Pp. 55-84 in The Rise and Fall of the New Deal Order: 1930-1980, edited by Steve Fraser and Gary Gerstle. Princeton, NJ: Princeton University Press. (online)

Week 2
(5/20): Class Politics in the United States
Scott, Janny and David Leonhardt. 2005. “Class in America: Shadowy Lines That Still Divide.” New York Times, May 15. (online)
Zweig, Michael. 2012. The Working Class Majority: America’s Best Kept Secret. Ithaca, NY: ILR Press. Pp. 7-39. (online and on reserve)

(5/22): Income and Social Mobility
Ehrenreich, Barbara. 2011. Nickel and Dimed: On (Not) Getting By in America. New York, NY: Picador. Pp. 1-49.
Boushey, Heather and Shawn Fremstad. 2008. “The Wages of Exclusion: Low-wage Work and Inequality.” New Labor Forum 17(2): 9-19. (online)
Zweig, Michael. 2012. The Working Class Majority: America’s Best Kept Secret. Ithaca, NY: ILR Press. Pp. 77-95. (online and on reserve)
WRITING ASSIGNMENT 1 DUE

Week 3
(5/27): Memorial Day, No Class

(5/29): The Role and Function of Unions
Yates, Michael. 2009. Why Unions Matter. New York, NY: Monthly Review Press. Pp. 31-67. (online)
Bureau of Labor Statistics. 2012. Union Members 2012. Washington D.C.: U.S. Department of Labor. (online)
Strom, Andrew. 2003. “U.S. Labor Law.” Dollars and Sense 249: 46-48. (online)
Exam 1
WRITING ASSIGNMENT 2 DUE

Week 4:
(6/3): Work, Race, Ethnicity and Equality
LeDuff, Charles. 2000. “At a Slaughterhouse, Some Things Never Die.” New York Times, June 16. (online)
Striffler, Steve. 2002. “Inside a Poultry Processing Plant: An Ethnographic Portrait.” Labor History 43(3): 305-314. (online)
Waldinger, Roger et al. 1998. “Helots No More: A Case Study of the Justice for Janitors Campaign in Los Angeles.” Pp. 102-119 in Organizing to Win, edited by Kate Bronfenbrenner, et al. Ithaca, NY: Cornell U Press. (online)

(6/5): Work, Gender and Family
Corbett, Christianne and Catherine Hill. 2012. Graduating to a Pay Gap: The Earnings of Women and Men One Year after College Graduation (2012). Washington D.C.: American Association of University Women. Pp. 5-21. (online)
Firestein, Netsy and Nicola Dones. 2007. “Unions Fight for Work and Family Policies—Not For Women Only.” Pp. 140-154 in The Sex of Class: Women Transforming American Labor, edited by Dorothy Sue Cobble, Ithaca, NY: Cornell University Press. (online)
Slaughter, Anne-Marie. 2012. “Why Women Still Can’t Have It All.” The Atlantic, July/August 2002. (online)
WRITING ASSIGNMENT 3 DUE

Week 5:
(6/10): Working in a Global Labor Market
Bowe, John. 2008. Nobodies: Modern American Slave Labor and the Dark Side of the New Global Economy. New York, NY: Random House. Pp. 3-85.
Schmitt, John and Kris Warner. 2010. “The Changing Face of U.S. Labor, 1983-2008.” Working USA: The Journal of Labor and Society 13(2): 263-279. (online)
Exam 2

(6/12): What Makes a Job “Good” or “Bad”?
Ehrenreich, Barbara. 2011. Nickel and Dimed: On (Not) Getting By in America. New York, NY: Picador. Pp. 51-119.
Fraser, Jill. 2002. White-Collar Sweatshop: The Deterioration of Work and Its Rewards in Corporate America. New York, NY: W. W. Norton & Company. Pp. 3-11. (online and on reserve)
Simon, Bryant. 2008. “Consuming Lattes and Labor, or Working at Starbucks.” International Labor and Working Class History 74: 193-211. (online)
WRITING ASSIGNMENT 4 DUE

Week 6
(6/17): Meeting Labor Needs
Freeman, Richard B. and Joel Rogers. 2006. What Workers Want. Ithaca, NY: Cornell University Press. Pp. 67-117. (online)
Freeman, Richard B. and Joel Rogers. 2002. “A Proposal to American Labor.” The Nation, June 6. (online)

(6/19): Final Exam

Similar Documents

Free Essay

Excel Short Keys

...Ctrl+Z Undo Ctrl+C Enter, Ctrl+V Ctrl+X Copy, Paste, Multiple Paste, Cut Ctrl+F, Ctrl+H Find, Find&Replace Ctrl+P, Ctrl+S, Ctrl+F4, Alt+F4 Print, Save, Close, Close Excel Ctrl+Arrow Move to edge of region Ctrl+* Select current region Ctrl+A Select all cells Ctrl+Home Ctrl+End Select A1, Select last cell in used range Ctrl+Shift+End Select from active cell to last cell in used range. Ctrl+Shift+Home Select from active cell to A1 Ctrl+Page Down Ctrl+Page Up Move to the next sheet, Move to the previous sheet Ctrl+Tab Move to next open workbook Ctrl+N Open new workbook Shift+F11 Insert new worksheet Shift+F3 Paste function window =+FunctionName+Ctrl+A Insert new function Alt+F11 Open VBE Ctrl+Shift+Enter Array formula Ctrl+F3, F3 Define name, Paste name Ctrl+Spacebar Shift+Spacebar Select columns, Select rows Ctrl+1, Ctrl+B, Ctrl+U Format cells, Bold, Underline Ctrl+; , Ctrl+shift+: Current date, Current time | | | | |Rate this tip | |  RATING: | |Email Tip | |Top of Form | |2.96 | | | | ...

Words: 1257 - Pages: 6

Free Essay

Linux Cli Paper

...1) bash- is a Unix shell written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell. Released in 1989, it has been distributed widely as the shell for the GNU operating system and as the default shell on Linux, Mac OS X and Darwin. 2) bsh- (Bourne shell) was the default Unix shell of Unix Version 7. Developed by Stephen Bourne at AT&T Bell Laboratories, it was a replacement for the Thompson shell. It was released in 1977 in the Version 7 Unix release distributed to colleges and universities. 3) tcsh- is a Unix shell based on and compatible with the C shell (csh). It is essentially the C shell with programmable command line completion, command-line editing, and a few other features. 4) csh- is a Unix shell that was created by Bill Joy while a graduate student at University of California, Berkeley in the 1970s. Other early contributors to the ideas or the code were Michael Ubell, Eric Allman, Mike O'Brien and Jim Kulp. The C shell is a command processor typically run in a text window, allowing the user to type commands. The C shell can also read commands from a file, called a script. 5) ksh- is a Unix shell which was developed by David Korn at Bell Labs in the early. Other early contributors were Bell Labs developers Mike Veach and Pat Sullivan, who wrote the Emacs- and vi-style line editing modes′ code, respectively. KornShell is backward-compatible with the Bourne shell and includes many features of the C shell, inspired...

Words: 1015 - Pages: 5

Premium Essay

Let Us C - Yashwant Kanetkar.Pdf

...Let Us C Fifth Edition Yashavant P. Kanetkar Dedicated to baba Who couldn’t be here to see this day... About the Author Destiny drew Yashavant Kanetkar towards computers when the IT industry was just making a beginning in India. Having completed his education from VJTI Mumbai and IIT Kanpur in Mechanical Engineering he started his training company in Nagpur. Yashavant has a passion for writing and is an author of several books in C, C++, VC++, C#, .NET, DirectX and COM programming. He is a much sought after speaker on various technology subjects and is a regular columnist for Express Computers and Developer 2.0. His current affiliations include being a Director of KICIT, a training company and DCube Software Technologies, a software development company. In recognition to his contribution Microsoft awarded him the prestigious “Best .NET Technical Contributor” award recently. He can be reached at kanetkar@kicit.com. Preface to the Fifth Edition It is mid 2004. World has left behind the DOTCOM bust, 9/11 tragedy, the economic downturn, etc. and moved on. Countless Indians have relentlessly worked for close to two decades to successfully establish “India” as a software brand. At times I take secret pleasure in seeing that a book that I have been part of, has contributed in its own little way in shaping so many budding careers that have made the “India” brand acceptable. Computing and the way people use C for doing it keeps changing as years go by. So overwhelming...

Words: 46379 - Pages: 186

Premium Essay

Let Us C

...Let Us C Fifth Edition Yashavant P. Kanetkar Dedicated to baba Who couldn’t be here to see this day... About the Author Destiny drew Yashavant Kanetkar towards computers when the IT industry was just making a beginning in India. Having completed his education from VJTI Mumbai and IIT Kanpur in Mechanical Engineering he started his training company in Nagpur. Yashavant has a passion for writing and is an author of several books in C, C++, VC++, C#, .NET, DirectX and COM programming. He is a much sought after speaker on various technology subjects and is a regular columnist for Express Computers and Developer 2.0. His current affiliations include being a Director of KICIT, a training company and DCube Software Technologies, a software development company. In recognition to his contribution Microsoft awarded him the prestigious “Best .NET Technical Contributor” award recently. He can be reached at kanetkar@kicit.com. Acknowledgments It has been a journey of almost a decade from the stage the book idea of “Let Us C” was conceived up to the release of this Fifth Edition. During this journey I have met so many students, developers, professors, publishers and authors who expressed their opinions about Let Us C. They have been the main motivators in my effort to continuously improve this book. In particular I am indebted to Manish Jain who had a faith in this book idea, believed in my writing ability, whispered the words of encouragement and made helpful suggestions...

Words: 46651 - Pages: 187

Free Essay

C Book

...Let Us C Fifth Edition Yashavant P. Kanetkar Dedicated to baba Who couldn’t be here to see this day... About the Author Destiny drew Yashavant Kanetkar towards computers when the IT industry was just making a beginning in India. Having completed his education from VJTI Mumbai and IIT Kanpur in Mechanical Engineering he started his training company in Nagpur. Yashavant has a passion for writing and is an author of several books in C, C++, VC++, C#, .NET, DirectX and COM programming. He is a much sought after speaker on various technology subjects and is a regular columnist for Express Computers and Developer 2.0. His current affiliations include being a Director of KICIT, a training company and DCube Software Technologies, a software development company. In recognition to his contribution Microsoft awarded him the prestigious “Best .NET Technical Contributor” award recently. He can be reached at kanetkar@kicit.com. Acknowledgments It has been a journey of almost a decade from the stage the book idea of “Let Us C” was conceived up to the release of this Fifth Edition. During this journey I have met so many students, developers, professors, publishers and authors who expressed their opinions about Let Us C. They have been the main motivators in my effort to continuously improve this book. In particular I am indebted to Manish Jain who had a faith in this book idea, believed in my writing ability, whispered the words of encouragement and made helpful suggestions...

Words: 46741 - Pages: 187

Premium Essay

Analysis

...SEVENTH EDITION PROBLEM SOLVING AND PROGRAM DESIGN in C This page intentionally left blank SEVENTH EDITION PROBLEM SOLVING AND PROGRAM DESIGN in C Jeri R. Hanly, University of Wyoming Elliot B. Koffman, Temple University Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editorial Director, ECS: Marcia Horton Editor-in-Chief: Michael Hirsch Senior Project Manager: Carole Snyder Director of Marketing: Patrice Jones Marketing Manager: Yezan Alayan Senior Marketing Coordinator: Kathryn Ferranti Director of Production: Vince O’Brien Managing Editor: Jeff Holcomb Associate Managing Editor: Robert Engelhardt Production Manager: Pat Brown Creative Director: Jayne Conte Designer: Suzanne Behnke Media Editor: Daniel Sandin Media Project Manager: John Cassar Cover Image: (c) michael Holcomb/Shutterstock.com Full-Service Project Management: Mohinder Singh/ Aptara®, Inc. Composition: Aptara®, Inc. Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Photo Credits: Page 4: Fig. 0.1: akg-images/Paul Almasy/Newscom. Page 11: Fig. 0.4: © 2008 IEEE/Journal of Microelectromechanical Systems (2006). Page 15:...

Words: 158087 - Pages: 633

Free Essay

Linux System Programming

...LINUX System Programming Other Linux resources from O’Reilly Related titles Building Embedded Linux Systems Designing Embedded Hardware Linux Device Drivers Linux Kernel in a Nutshell Programming Embedded Systems Running Linux Understanding Linux Network Internals Understanding the Linux Kernel Linux Books Resource Center linux.oreilly.com is a complete catalog of O’Reilly’s books on Linux and Unix and related technologies, including sample chapters and code examples. ONLamp.com is the premier site for the open source web platform: Linux, Apache, MySQL and either Perl, Python, or PHP. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in documenting the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit conferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online reference library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or simply flip to the page you need. Try it today for free. LINUX System Programming Robert Love Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux System Programming by Robert Love Copyright...

Words: 125679 - Pages: 503

Free Essay

Hacking the Art of Exploitation

...2nd Edition Hacking the art of exploitation jon erickson PRAISE FOR THE FIRST EDITION OF HACKING: THE ART OF EXPLOITATION “Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them.” —PHRACK “From all the books I’ve read so far, I would consider this the seminal hackers handbook.” —SECURITY FORUMS “I recommend this book for the programming section alone.” —UNIX REVIEW “I highly recommend this book. It is written by someone who knows of what he speaks, with usable code, tools and examples.” —IEEE CIPHER “Erickson’s book, a compact and no-nonsense guide for novice hackers, is filled with real code and hacking techniques and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher:...

Words: 139438 - Pages: 558

Free Essay

Security Weaknesses Top 25

...2011 CWE/SANS Top 25 Most Dangerous Software Errors Copyright © 2011 http://cwe.mitre.org/top25/ The MITRE Corporation Document version: 1.0.3 Project Coordinators: Bob Martin (MITRE) Mason Brown (SANS) Alan Paller (SANS) Dennis Kirby (SANS) Date: September 13, 2011 Document Editor: Steve Christey (MITRE) Introduction The 2011 CWE/SANS Top 25 Most Dangerous Software Errors is a list of the most widespread and critical errors that can lead to serious vulnerabilities in software. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all. The Top 25 list is a tool for education and awareness to help programmers to prevent the kinds of vulnerabilities that plague the software industry, by identifying and avoiding all-too-common mistakes that occur before software is even shipped. Software customers can use the same list to help them to ask for more secure software. Researchers in software security can use the Top 25 to focus on a narrow but important subset of all known security weaknesses. Finally, software managers and CIOs can use the Top 25 list as a measuring stick of progress in their efforts to secure their software. The list is the result of collaboration between the SANS Institute, MITRE, and many top software security experts in the US and Europe. It leverages experiences in the development of the SANS Top 20 attack vectors...

Words: 24162 - Pages: 97

Free Essay

Test

...Contents At a Glance I Advanced UNIX Programming with Linux Advanced Linux Programming 1 Getting Started 3 2 Writing Good GNU/Linux Software 17 3 Processes 45 4 Threads 61 5 Interprocess Communication 95 II Mastering Linux 6 Devices 129 7 The /proc File System 147 8 Linux System Calls 167 9 Inline Assembly Code 189 10 Security 197 11 A Sample GNU/Linux Application 219 III Appendixes A Other Development Tools 259 B Low-Level I/O 281 C Table of Signals 301 D Online Resources 303 E Open Publication License Version 1.0 305 F GNU General Public License 309 Advanced Linux Programming Mark Mitchell, Jeffrey Oldham, and Alex Samuel www.newriders.com 201 West 103rd Street, Indianapolis, Indiana 46290 An Imprint of Pearson Education Boston • Indianapolis • London • Munich • New York • San Francisco Advanced Linux Programming Copyright © 2001 by New Riders Publishing FIRST EDITION: June, 2001 All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. International Standard Book Number: 0-7357-1043-0 Library of Congress Catalog Card Number: 00-105343 05 04 03 02 01 7 6 5 4 3 2 1 Interpretation of the printing code:The rightmost doubledigit number is the year of the book’s printing; the rightmost single-digit...

Words: 80064 - Pages: 321

Free Essay

Rute Linux Tutorial

...LINUX: Rute User’s Tutorial and Exposition Paul Sheer August 14, 2001 Pages up to and including this page are not included by Prentice Hall. 2 “The reason we don’t sell billions and billions of Guides,” continued Harl, after wiping his mouth, “is the expense. What we do is we sell one Guide billions and billions of times. We exploit the multidimensional nature of the Universe to cut down on manufacturing costs. And we don’t sell to penniless hitchhikers. What a stupid notion that was! Find the one section of the market that, more or less by definition, doesn’t have any money, and try to sell to it. No. We sell to the affluent business traveler and his vacationing wife in a billion, billion different futures. This is the most radical, dynamic and thrusting business venture in the entire multidimensional infinity of space-time-probability ever.” ... Ford was completely at a loss for what to do next. “Look,” he said in a stern voice. But he wasn’t certain how far saying things like “Look” in a stern voice was necessarily going to get him, and time was not on his side. What the hell, he thought, you’re only young once, and threw himself out of the window. That would at least keep the element of surprise on his side. ... In a spirit of scientific inquiry he hurled himself out of the window again. Douglas Adams Mostly Harmless Strangely, the thing that least intrigued me was how they’d managed to get it all done. I suppose I sort of knew. If I’d learned...

Words: 159689 - Pages: 639

Free Essay

Business

...断易天机 名家占卜精论集成 图解稀世易断国宝 汤梓顺 韩铭生 注译 辽宁大学出版社出版 1993年4月第一版 卷首语 《断易天机》是成书于明万历丁酉(注:公元1597年)年间的一部秘藏绝版书,是久已 淹没失传的珍贵文献。该书是集中国古代易学大师、卜筮名家权威著作于一书的宏篇巨著, 是将易理与卜筮有机结合的典范。为了配合《中华周易》的放映,为了继承、发扬中华文化 瑰宝--卜筮科学,推动信息预测,决策科学的发展,编者整理、注释、翻译出版了此书, 以餮读者。 关于《断易天机》--代序 一、《周易》--包罗万象的宇宙代数学 一座由八卦的巨石垒砌起来的神秘文化殿堂,高耸在云雾缭绕的山颠之上。陵谷变迁、 王朝易代、从蒙昧远古的洪荒时代,到人类文明高度发展的今天,被称为众经之首,大道之 源的周易,经历了历史的风风雨雨,经历了肯定、否定、否定之否定,这样一个沉浮过程。 但是它始终以独特的思维逻辑与数理机制, 以它深邃的文化意蕴与文化价值, 折射出民 族文化的灿烂光辉,引导和启示着龙的传人,按照它的思维模式,趋吉避凶。在这块黄土地 上繁衍生息。 380年前传入欧洲以后,深刻的影响世界文化,在《周易》启迪下,产生了二进位制, 使得计算机得以诞生,木王星的发现,轰动了世界天文界,太极宇宙模型的建立,将作为二 十一世纪科学思维的方法论、、、、、、。因此,周易被誉为包罗万象的宇宙代数学。 二、东方神奇的卜筮术 周易是卜筮之书,无论从卦辞、爻辞来看,或从《周礼》、《左传》、《国语》诸书记 载来看,都是不能否定的。 但卜筮源于无知,同时又是对无知的否定,渴求有知。卜筮与巫术是一对孪生兄弟,卜 筮之所以有灵, 不能不借助于巫术, 巫为了取信于人, 很自然又向卜筮中, 输入有知的因素, 以减少无知的因素,久而久之发生了质变。 秦以前,《易经》是卜书,经两汉、晋、宋、、、、、、,以象数理为旨的易学,才蒸 蒸日上,蔚为大观,作为一门预测吉凶休咎的卜筮书,它的准确性,令人惊叹,这里略举数 例如下: 《左传昭公元年》,晋候求医于秦,秦伯候命医和视之,占得山风蛊曰:“不可为也, 是近女室,疾如蛊、、、、、、”。赵孟曰:“何为蛊”?对曰:“淫溺惑乱之所生也”。 在《周易》中,女惑男,风落山为蛊,这是医生用占卜断病的例子。 蛊、上卦为艮,为少男,下卦巽为长女,是女惑男之象。 艮又为山,巽为风,风吹木落,因此断定晋候为纵欲过度而染疾,用纳甲法分析于下: 巽宫:山风蛊(归魂) 【本 卦】 六神 ▄▄▄▄▄ 兄弟丙寅木 应 螣蛇 ▄▄ ▄▄ 父母丙子水 勾陈 ▄▄ ▄▄ 妻财丙戌土 朱雀 ▄▄▄▄▄ 官鬼辛酉金 世 青龙 ▄▄▄▄▄ 父母辛亥水 玄武 ▄▄ ▄▄ 妻财辛丑土 白虎 卦中官鬼酉金持世,测病又取为用神,卦中妻财两现,一男两女,土又生金,又鬼临青 龙,为贪色过度,因此医生诊断准确。 (虎易注:此卦六神配爻,以及其分析“又鬼临青龙, 为贪色过度”,查《左传》记录,无月和日,其六神所配,当无原始记录的依据。此当为译 者据卦理推演的,提请读者注意。) 北宋易学大师邵雍,己丑日卯时,遇一老人往巽方,有忧色,问何忧?曰:“无”。怪 而占之,得《姤》之《巽》,九四爻动,爻辞曰:“包无鱼,凶”。先生曰:“汝五日内, 宜慎出入,恐有大祸”。果于五日赴吉席,因鱼骨鲠喉而死。 社会在发展, 人类的思维能力在进步, 神奇的卜筮学, 必将对社会进步作出积极的贡献。 三、中国古代名家全书大成――《断易天机》 我国古代研究卜筮的专著, 汗牛充栋, 由于迭更战乱, 流传至今的古籍屈指可数,...

Words: 32138 - Pages: 129